The internal feed reader APIs that crossed the sandbox barrier allowed for a sandbox escape and escalation of privilege if combined with another vulnerability that resulted in remote code execution inside the sandboxed process. This vulnerability affects Firefox ESR < 52.1 and Firefox < 53.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Enterprise_linux | Redhat | 7.0 (including) | 7.0 (including) |
Enterprise_linux_desktop | Redhat | 7.0 (including) | 7.0 (including) |
Enterprise_linux_server | Redhat | 7.0 (including) | 7.0 (including) |
Enterprise_linux_server_aus | Redhat | 7.3 (including) | 7.3 (including) |
Enterprise_linux_server_aus | Redhat | 7.4 (including) | 7.4 (including) |
Enterprise_linux_server_eus | Redhat | 7.3 (including) | 7.3 (including) |
Enterprise_linux_server_eus | Redhat | 7.4 (including) | 7.4 (including) |
Enterprise_linux_server_eus | Redhat | 7.5 (including) | 7.5 (including) |
Enterprise_linux_workstation | Redhat | 7.0 (including) | 7.0 (including) |
Firefox | Ubuntu | devel | * |
Firefox | Ubuntu | precise | * |
Firefox | Ubuntu | trusty | * |
Firefox | Ubuntu | upstream | * |
Firefox | Ubuntu | xenial | * |
Firefox | Ubuntu | yakkety | * |
Firefox | Ubuntu | zesty | * |
Thunderbird | Ubuntu | precise | * |
Red Hat Enterprise Linux 7 | RedHat | firefox-0:52.1.0-2.el7_3 | * |